CVE-2025-12849
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-15

Last updated on: 2025-11-15

Assigner: Wordfence

Description
The Contest Gallery plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 28.0.2. This is due to the plugin registering the `cg_check_wp_admin_upload_v10` AJAX action for both authenticated and unauthenticated users without implementing capability checks or nonce verification. This makes it possible for unauthenticated attackers to inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata via the `cg_check_wp_admin_upload_v10` action. It does not enable an attacker to move or upload files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-15
Last Modified
2025-11-15
Generated
2026-05-07
AI Q&A
2025-11-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordpress contest_gallery *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow unauthenticated attackers to inject arbitrary media attachments into your WordPress galleries and manipulate gallery metadata. This could lead to unauthorized content being displayed on your site, potentially damaging your site's integrity and user trust. However, attackers cannot move or upload files, limiting the scope of the impact.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, immediately update the Contest Gallery plugin to a version later than 28.0.2 where the authorization bypass issue is fixed. If an update is not available, consider disabling the plugin until a patch is released. Additionally, restrict access to the vulnerable AJAX action by implementing capability checks or nonce verification if you can modify the plugin code.


Can you explain this vulnerability to me?

The vulnerability in the Contest Gallery plugin for WordPress allows unauthorized users to bypass authorization checks because the plugin registers an AJAX action ('cg_check_wp_admin_upload_v10') for both authenticated and unauthenticated users without proper capability checks or nonce verification. This means attackers who are not logged in can inject arbitrary WordPress media attachments into galleries and manipulate gallery metadata, although they cannot move or upload files.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart